Rob Galbraith

62%
Flag icon
The second is “brute-forcing” it—methodically guessing every single code combination until you hit the right one. Hackers—and security agencies—use sophisticated software to pull this off, but it can nonetheless take ages.
The One Device: The Secret History of the iPhone
Rate this book
Clear rating